2017 GSN Airport, Seaport, Border Security Awards 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

January 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Wanted: Cognitive security systems that are predictive and forward looking

James Ionson
of JDC Inc.

Such a system strives to minimize uncertainty, suspicion and fear cost expressions, as in a manner that simulates the cognitive processing abilities of human beings, given the same conditions. The result is a security system that is able to instinctively predict impending security breaches before they actually occur. 

A gaming application

For example, casino surveillance directors are well aware of threat profiles of gamblers who use statistical card-counting techniques to maximize blackjack winnings. The behavior of card counters is quite deliberate; they do not wander or linger, but, instead, move directly to an empty table, using only two decks of cards. Variation in their wagers is abnormally large and is correlated with statistics of prior hands played.   

Security cameras provide detailed video of cards being dealt, payouts and losses. Behaviors are analyzed by processing video data and continuously updating a database of hands played, cards dealt and wagers associated with wins and losses. The data are processed by symbolic cognitive architectures and inference process algebras.

Using “probability” as its cost function to build a ranked set of hypotheses for prediction and interpolation, the cognitive system looks for probable correlations that suggest suspicious behavior patterns.  

While the presence of two or more players at a blackjack table normally wouldn’t be cause for alarm, the symbolic cognitive architectures and inference process algebras drive the system to be “curious,” looking for unusual correlations, such as the behavior of a team of card counters at the table. In this case, the team’s playing strategy is correlated in a manner atypical of recreational players.  

Recreational players strive to win, but card-counting teams have an opposite behavior -- one player deliberately loses a small-wager hand in order to optimize the other member’s chances of winning with a significantly higher wager. As the system detects these correlations, it learns the new threat profile for a team, then it reconfigures security cameras to provide more details of their playing pattern. This system continues to process data using these architectures and algebras until a user-defined threshold probability suggests that a security breach related to card counting is about to take place.  

Cognitive systems are the cost-effective answer

Today, only highly trained security officers are capable of correlating suspicious behaviors of individuals, which, although effective, is expensive and very inefficient. What is needed is a security system designed to replicate the instinctive and cognitive capabilities of these highly trained officers.



Recent Videos

“Varian’s Imaging Components business has a 50 plus year history of dedication to the imaging industry.”—Sunny Sanyal, Senior Vice President and...
IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile...